If you’ve been tracking recent cyber attacks, you know that there have been multiple incidents from what is believed to be the same threat actor who conducted the Solarwinds Sunburst attack,using compromised applications in victim’s Office 365 and Azure environments.
Learn how this threat actor utilizes additional credentials and gains API access to cloud resources of these organizations in our upcoming on-demand webinar.